訪問控製表 的英文怎麼說

中文拼音 [fǎngwènkòngzhìbiǎo]
訪問控製表 英文
access control table
  • : 動詞1. (訪問) call on; interview; visit 2. (調查; 尋求) inquiry into; seek by inquiry [search]; try to get
  • : Ⅰ動詞1 (請人解答) ask; inquire 2 (詢問; 慰問) question; ask about [after]; inquire about [aft...
  • : 動詞1 (告發;控告) accuse; charge 2 (控制) control; dominate 3 (使容器口兒朝下 讓裏面的液體慢...
  • : Ⅰ名詞1 (外面;外表) outside; surface; external 2 (中表親戚) the relationship between the child...
  • 訪問 : visit; call on; interview; access; addressing; reference to
  1. You ll find a good example of using acls on the

    上使您自己熟悉訪問控製表。您將在
  2. We characterized the security issues in asp - based networked manufacturing system, especially the issue of the user access control. then the typical methods of access control were introduced, which include discretionary access control ( dac ), mandatory access control ( mac ), role - based access control ( rbac ), task - based access control ( tbac ), coalition - based access control ( cbac ) and relationship - driven access control ( rdac ) and so on. based on that, we provided an integrated user access control model, which was composed of rbac, tbac, rdac and cbac

    本章描述了asp和網路化造系統的安全性題,尤其是用戶制的題;接著介紹了幾種浙江大學博士學位論文典型的制方法,包括強制制、任意制、基於角色的制、基於任務的制,以及基於公司關系的制、基於企業聯盟的制等;在前面描述的典型制模型基礎上,給出了一個網路化造系統的綜合制模型,包括網路化造系統的用戶和資源層次關系圖、制參考模型和制過程模型,並定義了各個模型中的相關元素和關系,給出了各級約束驗證和授權的達;最後我們給出了以xacml為基礎的網路化造系統的制描述語言。
  3. Access control lists let you define fine - grained permissions for files

    訪問控製表讓您定義細粒度的文件許可權。
  4. It provides access to detailed process data and precise control functions across the plant, providing operators with customized data including alarm lists, process graphics, control faceplates and trend displays

    它可以在整個工廠里具體的過程數據和精確的制功能,向操作員提供定的數據,包括警報列、過程圖制面板和趨勢顯示。
  5. And design the acl valid check algorithm and acl access check algorithm

    設計了訪問控製表有效性判斷策略和制規則檢查策略。
  6. The next incredibly cool samba 2. 2 feature is its new support for access control lists, or acls

    Samba 2 . 2另一個不可思議的絕妙特性是對訪問控製表( acl )的新支持。
  7. Full coverage of access control lists is beyond the scope of this article, but you can find a great introduction to acls on the bestbits site see

    全面討論訪問控製表超出了本文的范圍,但是您可以在bestbits站點(請參閱
  8. One of these goodies is some special functionality called " access control lists " or acls, and is now enabled on xfs filesystems by default

    其中之一是一些名為「訪問控製表」或acl的特殊功能,現在在xfs文件系統上預設啟用這些功能。
  9. Third, presents a method to put acl on the abstract layer of extended attribute ( ea ) mechanism. the acls are passed in the ea system calls

    三、對文件系統的擴展屬性機制進行研究,並利用文件系統的擴展屬性( ea )機制傳遞、存儲和保護訪問控製表
  10. Securing web services with acls, however, does not mitigate the risk of exposing web services and non - web services vulnerabilities to a malicious attack

    訪問控製表保護web服務,然而,這並不能減輕web服務(以及非web服務)漏洞受到惡意攻擊的危險。
  11. Main achievements include : first, supporting the posix family of standards, the thesis adds two new acl entries in to access control list for global uses

    在遵循posix1003 . 1e標準的基礎上,擴展了訪問控製表語法規則,增加了用於全局設置的訪問控製表規則項。
  12. I ll guide you through the process of setting up xfs on your own system, as well as cover xfs tuning tips and useful xfs features like acl access control lists and extended attribute support

    中,我將全程指導您在自己的系統上設置xfs ,並講述了xfs調優技巧和諸如acl (訪問控製表)及擴展屬性支持之類有用的xfs特性。
  13. To overcome the shortcoming of the double - way authentication access control scheme based on harn ' s digital signature, a new double - way authentication protocol is proposed to improve the old one. a new single - key - lock - pair access control scheme is proposed as a improved access control scheme, based on the property that a integer can be denoted into only one binary digital

    針對基於harn數字簽名雙向認證制實現方案中所存在的題,運用密碼技術改進了原方案的雙向認證協議,並作為對原制方案的改進,基於整數二進示的唯一性,提出了一種新的單鑰-鎖對制方案。
  14. This thesis researchs the correlative security evaluation criteria and analyses in detail linux kernel at first. linux kernel is improved at four aspects : access control list, capability, system audit, mandatory access control, based on linux kernel 2. 4. 4 on tcsec and the security level of linux is enhanced from cl to bl

    本論文首先研究了相關的安全評估標準,並對linux內核進行了詳細地分析,然後以tcsec為標準,基於linux內核2 . 4 . 4 ,分別從訪問控製表、權能、系統審計以及強制制四個方面時linux內核進行了改進,使linux的安個級別從c1級提高到了b1級。
分享友人